Masterarbeit, 2016
53 Seiten, Note: A+
Chapter – I: Introduction
1.1 Introduction
1.2 Characteristics of MANETs
1.3 Architecture of MANETs
1.4 MANET Standards
1.5 MANET Challenges:
1.6 Security Challenges:
1.7 Criteria for Security in MANET:
Chapter – II: State of Art and Literature
2.1 Introduction
2.2 Proactive Routing Protocols:
2.3 Reactive protocols:
2.4 Position Based Routing Protocols:
2.5 Routing Protocol Comparison
Chapter – III: Proposed Secure Multipath Routing Protocol
3.1 Introduction to Proposed Routing Protocol
3.2 Secure Multipath Ad Hoc On-Demand Distance Vector Routing Protocol (SMAODV):
Chapter – IV: Experimental Evaluation:
4.1 Introduction
4.2 Simulation Results
Chapter – V: Conclusion and Future
5.1 Summary
5.2 Future Work
This work aims to address critical security vulnerabilities in Mobile Ad Hoc Networks (MANETs), specifically focusing on malicious nodes that drop packets despite appearing legitimate. The research objective is to develop and evaluate a secure routing protocol (SMAODV) that utilizes multiple paths and rebroadcasting mechanisms to mitigate the impact of such attacks on network availability and performance.
3.2 Secure Multipath Ad Hoc On-Demand Distance Vector Routing Protocol (SMAODV):
SMAODV is the modification of Ad Hoc On-demand Multipath Distance Vector (AOMDV) routing protocol which makes use of alternate paths to eliminate the effect of malicious nodes in network. When a node wishes to send data to another node in a network, it first initiates RREQ packet flooding process to discover the shortest path to destination. A route is discovered when the source node receives RREP packet sent by the destination node in response to RREQ packet. The SMAODV allows each node to accept multiple RREP packets which are sent by destination in response to multiple RREQ packets, due to which multiple paths are constructed between each pair of nodes in a network. These multiple paths are then being used to reduce the effect of malicious nodes in the network. Also, the data packets transmitted from a particular source to destination are labelled with counter, which gets incremented each time a data packet gets generated by source node. So each packet has a unique counter value for a particular source-destination pair. This unique number (counter value) is then used to check whether the packets arrive in order or out-of-order at destination.
Chapter – I: Introduction: Provides an overview of MANETs, their unique characteristics, architectural models, standardization, and the fundamental security and operational challenges they face.
Chapter – II: State of Art and Literature: Reviews existing routing protocols, classifying them into proactive, reactive, and position-based categories, while highlighting their limitations regarding security in hostile environments.
Chapter – III: Proposed Secure Multipath Routing Protocol: Introduces the SMAODV protocol, which modifies existing multipath techniques to incorporate path randomization and packet loss detection to isolate malicious behavior.
Chapter – IV: Experimental Evaluation: Details the simulation setup using NS-2 and presents comparative results regarding packet delivery ratio, throughput, and end-to-end delay against established protocols.
Chapter – V: Conclusion and Future: Summarizes the effectiveness of the SMAODV protocol in improving network security and suggests potential avenues for future research including application to VANETs.
MANET, Secure Routing, AODV, SMAODV, Multipath Routing, Network Security, Packet Delivery Ratio, Throughput, Malicious Nodes, Wireless Networks, Simulation, NS-2, Rebroadcasting, Routing Protocols, Data Integrity.
The work focuses on enhancing the security of MANETs by introducing a secure routing protocol that mitigates the impact of malicious nodes that drop data packets.
The core themes include MANET architecture, routing protocol classification, security vulnerabilities in ad hoc environments, and performance optimization through multipath routing.
The primary objective of SMAODV is to guarantee a security solution that defends against attacks on availability by utilizing multiple paths between source-destination pairs to bypass malicious routes.
The researcher uses a simulation-based methodology, specifically employing the NS-2 (Network Simulator) platform to construct MANET scenarios and compare performance metrics.
The main body covers the theoretical background of MANETs, a review of existing state-of-the-art routing protocols, the technical design of the proposed SMAODV algorithm, and an experimental performance evaluation.
Key terms include MANET, Secure Routing, SMAODV, Multipath, Packet Delivery Ratio, and Network Security.
SMAODV does not explicitly detect the malicious node itself, but rather monitors packet loss. If a route causes significant packet loss, the protocol identifies it as unreliable and eliminates it, thereby removing the influence of the malicious node.
The rebroadcasting timer is used to trigger periodic re-flooding of RREQ packets, allowing the network to continuously update and discover fresh alternate paths to adapt to the high dynamism and mobility of MANET nodes.
The destination node uses the counter value of received packets to detect inconsistencies. If a gap exceeds a certain threshold, it indicates packet loss, prompting the destination to request retransmission via a different route.
Der GRIN Verlag hat sich seit 1998 auf die Veröffentlichung akademischer eBooks und Bücher spezialisiert. Der GRIN Verlag steht damit als erstes Unternehmen für User Generated Quality Content. Die Verlagsseiten GRIN.com, Hausarbeiten.de und Diplomarbeiten24 bieten für Hochschullehrer, Absolventen und Studenten die ideale Plattform, wissenschaftliche Texte wie Hausarbeiten, Referate, Bachelorarbeiten, Masterarbeiten, Diplomarbeiten, Dissertationen und wissenschaftliche Aufsätze einem breiten Publikum zu präsentieren.
Kostenfreie Veröffentlichung: Hausarbeit, Bachelorarbeit, Diplomarbeit, Dissertation, Masterarbeit, Interpretation oder Referat jetzt veröffentlichen!

